The rwm overlay in OpenLDAP 2.4.23, 2.4.36, and earlier does not properly count references, which allows remote attackers to cause a denial of service (slapd crash) by unbinding immediately after a search request, which triggers rwmconndestroy to free the session context while it is being used by rwmopsearch.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libldap-2.4-2-dbg": "2.4.31-1+nmu2ubuntu8.1", "libldap2-dev-dbgsym": "2.4.31-1+nmu2ubuntu8.1", "slapd-dbg": "2.4.31-1+nmu2ubuntu8.1", "ldap-utils-dbgsym": "2.4.31-1+nmu2ubuntu8.1", "libldap-2.4-2-dbgsym": "2.4.31-1+nmu2ubuntu8.1", "libldap2-dev": "2.4.31-1+nmu2ubuntu8.1", "libldap-2.4-2": "2.4.31-1+nmu2ubuntu8.1", "slapd-smbk5pwd-dbgsym": "2.4.31-1+nmu2ubuntu8.1", "slapd-dbgsym": "2.4.31-1+nmu2ubuntu8.1", "slapd": "2.4.31-1+nmu2ubuntu8.1", "slapd-smbk5pwd": "2.4.31-1+nmu2ubuntu8.1", "ldap-utils": "2.4.31-1+nmu2ubuntu8.1" } ] }